Physical security - Expert commentary

Security industry’s top 10 mergers & acquisitions of 2015

For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015.   Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...

Hardening perimeter security by integrating more access control technology at entrances

At 2015 year-end, we are continuing to see a trend toward hardening the perimeter for buildings and property. I believe we are approaching a tipping point with respect to C-suite awareness of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action. Role of trusted consult...

Cybersecurity and mobile apps to see greater demand for improved security in 2016

The global economy presented some challenges to Tyco Security Products in several ways throughout 2015. Anyone in oil and gas or mining experienced an impact resulting from the market dynamics within those verticals. Also, the significant strength of the US dollar versus other currencies is impacting order value for companies with a global footprint. All in all, though, business remains strong and growing.   Measures to strengthen cybersecurity Looking ahead to 2016, cybersec...

Increased interconnectivity of systems and technologies allows security integrators to become technology solutions engineers

For many years, the physical security industry seemed at a standstill, maintaining the status quo. In recent years, it’s become clear that change is a constant, effectively altering the landscape of the systems integration industry and all it encompasses.   In 2015, we continued to see the proliferation of news about the Internet of Things (loT) and the ways in which connected systems and technologies will affect both the manufacturing and installation communities. As mo...

Security industry benefits from greater public sector spending & market growth despite fears of economic stagnation

Overall 2015 has been a year of increased public sector spending (as the UK economy continues to emerge from the recession), which has been highly beneficial to the security industry. This trend has been particularly evident in the healthcare and education sectors, which are key markets for TDSi. Nobody could have predicted the significant number of international security and terrorism threats this year. Undoubtedly this will result in even closer ties among the security industry, police and se...

2015 sees rise of drone detection systems and the convergence of physical and cyber security

Physical and cyber security convergence, perimeter intrusion detection systems and fibre optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organisations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...

How security plans with reliable policies and procedures deliver improved operational effectiveness

Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...

The role of security integrators in preventing tailgating

Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...

How Windows 10 enhances ATM security by protecting against cyber attacks

Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarised the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromised by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According to Telford, there are certain immutable laws of ATM Sec...

Risk based security solutions – a holistic and balanced approach to security management

Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families.  As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...

Lessons for security sector from the Paris attacks: The value of sharing data and vigilant guarding

The Eiffel tower illuminated with colours of the French national flag on November 16 Let’s say it up front: The physical security sector has limited solutions to address events like those in Paris on the 13th November. The series of coordinated terrorist attacks consisted of mass shootings, suicide bombings, and hostage-taking in which 129 people died. Among the dead were 89 people at the Bataclan theatre where American band Eagles of Death Metal was playing at the t...

IoT intelligent building systems expose security threats and challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

How museums employ security measures to counteract art thefts

Major art heists often feature audacity that defeats even the most thorough security protocols  Museum security, like art, is ever-changing. Traditional security practices like manned guarding alone are not sufficient to keep thieves at bay. Modern security technologies such as video surveillance, motions detectors, intruder alarms and other physical security devices also play an equally important role in securing museums and its art work. Regrettably, having all the...

Cyber attacks on physical systems call for a blended security approach

Problems caused by physical systems in terms of cyber-attack are quite extensive, damaging systems and assets  Security experts of various disciplines agree that physical systems are increasingly being leveraged in attacks on organisational networks and supply chains. Many manufacturers maintain that security (including that of security systems) is the responsibility of the end user, which would be fine if they were only expected to maintain security and not create th...

3 steps to implementing operational efficiency into physical security design

How do you get all of your various vendors, services, resources, manpower, and technology to integrate and work together? Creating an efficient operating environment in physical security is no small feat - especially when the organisation undertaking such an endeavour has a nationwide presence. How do you get all of your various vendors, services, resources, manpower, and technology to integrate and work together? How do you aggregate all of the data being recorded into in...

How effective is physical security technology amid Europe’s current migrant crisis?

Millions of dollars are spent annually at border crossings on technology such as buried volumetric sensors Border control forces, train operators, ferry companies and humanitarian organisations have spent much of 2015 concerned with people trafficking between the northern coast of France and the United Kingdom. Now the focus has switched to migrants fleeing civil war in Syria. It is one of the biggest migrant crisis that Europe has witnessed so far, with hundreds of refugees s...

ONVIF standards increase value proposition of IP-based video surveillance

Ballantyne has created the "Three Vectors of Value" for video surveillance - Awareness, Evidence and Behaviiour   The annual global expenditure in new video surveillance systems is currently estimated at about 20 billion USD and grows at a rate of better than 15% per year. To those of us in the business, these figures both encourage and validate. The expenditure is impressive, but only because commensurate value is delivered. That is, we expect expenditure and value to ba...

Cyber threat detection and protection takes centre stage at ASIS 2015

The potential costs and consequences of hackers getting through firewalls and onto the user’s computer networks can be devastating Theft of NATO data. Leakage of emails. Hackers setting up a live streaming website for over 100 New York City private webcams and even hacking the infrastructure servers of the U.S. government. As news of malicious takeover of private and corporate networks as well as incidents of malicious software programs, referred to as malware, conti...

ASIS International 2015: Changing security industry trends with focus on value-added applications

Aventura continues to expands expand its feature set of products beyond PSIM As the 61st annual ASIS 2015 kicked off in Anaheim, Calif., it became increasingly clear that physical security continues to move from the realm of traditional intrusion detection, video surveillance and alarms into value-added applications that extend into new markets, uses and purposes – many of them centred on business and operational processes. While video surveillance, intrusion detection,...

ASIS International 2015 brings together security services, disruptive technologies and technological innovations

The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organisations against social media threats. The organisers of the ASIS International 61st Annual Seminar and Exhibits — ASI...

NVR appliances – expanding functionalities ensure savings for end-users and value for dealers & integrators

NVR appliances are increasingly importantfor businesses incorporating a well-roundedphysical security plan  A major, oft-mentioned advantage of network video recorder (NVR) appliances is their ease of installation and use. These machines come pre-installed with software and are as close to plug-and-play as you can get in the IP video surveillance world. NVRs are also being designed to support 4K technology as well withstand a variety of applications and uses.  W...

Integrator Preferred Technologies adopts value engineering and custom expertise to simplify end-user interface

System integration is about adding value, and value-engineering is the solution to address the challenges facing the customer and their facility Leading systems integrators continue to embrace new technology and add a range of services focusing on IT, connectivity and integration. The trend will continue for forward-thinking companies seeking to differentiate themselves from the competition and gain a loyal following of end-user customers.  Pref-Tech - History and backg...

How to harness casino surveillance for better customer service and profitability

With the power of new technology and analytics, security systems could be used in other ways as well Security and surveillance systems are valuable beyond strictly providing compliance in the casino market. Even beyond ensuring physical security on premises outside the casino floor, systems are providing additional benefits including customer service, marketing and profitability, says Maureen Bruen, vertical market specialist – gaming, Honeywell Security Products Ame...

School security & safety best practices: Designing physical security framework

School security has increasingly become an area of focus among school boards and municipalities. Officials are constantly seeking to implement or improve security and safety policies, procedures and technologies to offer the highest level of protection for students, staff and visitors. Every second counts in an emergency or crisis, making it imperative that schools have policies and procedures in place that make it possible to lock down buildings instantly while simultaneousl...

PSIM transition to Converged Security and Information Management (CSIM)

(see bigger image) The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems In this article, James I. Chong, CEO & Founder of Vidsys, sheds light on true PSIM (Physical Security Information Management). He mentions how Vidsys is continually innovating and accelerating its roadmap for PSIM toward Converged Security and Information Management or CSIM. Citing various analysts’ projection, James s...

Physical security industry adopts social media monitoring

Private security professionals and law enforcement personnel are leveraging social media as a physical security tool to identify security threats and prevent crime. “Knowledge is power, and we’re all learning to cyber-sleuth to keep up with the bad guys,” says Wendy Patrick, JD, PhD, Deputy District Attorney, special operations division, San Diego District Attorney’s office and president of the Association of Threat Assessment Professionals San Diego...

Physical security solution buying guide: 7 things to consider

All seven decision factors contribute to an effective physical security solution Installation of an effective physical security solution can enable end users to avoid serious mistakes. This article presents a comprehensive and consultative decision methodology to help end users make the best decisions about security entrance products for the long term. The decision-making process is based on Boon Edam’s more than 100 years of experience in installing thousands of entry s...

Biometric security: Growth and challenges in fingerprint technology and new devices

Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice preside...

Assessing cyber security risks and vulnerabilities

Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...

Video technology transformation requires recalibrating the market

See bigger image Old pyramid w # of cams It’s clear that the network-based physical security industry has matured rapidly over the past few years. As the technology and other components of security solutions have advanced, so too have the customer’s expectations. Security solution companies must evolve in order to meet these new expectations. This requires an understanding of both the technology and the customers’ motivators, issues and hot buttons. Arr...

Quick poll
Which AI-powered capability will dominate in the years ahead?